Skip to content

Commit 050d757

Browse files
Harsh AroraHarsh Arora
authored andcommitted
image editions
1 parent 614efa3 commit 050d757

File tree

3 files changed

+28
-35
lines changed

3 files changed

+28
-35
lines changed

deploy/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -67,12 +67,12 @@ Apart from "citrix-node-controller" deployment, some other resources are also cr
6767
- For each worker node, a "kube-cnc-router" pod.
6868
- A configmap "kube-cnc-router".
6969
70-
![Verification](../images/kube_cnc_router.png)
70+
<img src="images/kube_cnc_router.png" width="600" height="300">
7171
7272
On each of the worker nodes, a interface "cncvxlan<hash-of-namespace>" and iptables rule will get created.
7373
74-
![Verification](../images/slave-1.png)
75-
![Verification](../images/slave-2.png)
74+
<img src="images/slave-1.png" width="600" height="300">
75+
<img src="images/slave-2.png" width="600" height="300">
7676
7777
7878
# Delete the Citrix K8s node controller

deploy/citrix-k8s-node-controller.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ spec:
9999
serviceAccountName: citrix-node-controller
100100
containers:
101101
- name: citrix-node-controller
102-
image: "quay.io/citrix/citrix-k8s-node-controller:2.2.1"
102+
image: "quay.io/citrix/citrix-k8s-node-controller:2.2.2"
103103
imagePullPolicy: Always
104104
env:
105105
- name: NS_IP

deploy/troubleshoot.md

Lines changed: 24 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22

33
Quick help Guide for some of the common issues that may arise.
44

5+
To validate ADC and basic Node configurations, Refer the screenshots on [deployment](deploy/README.md) page.
6+
57
### Service status DOWN
68

79
We can verify few things to debug the issue of services being in DOWN state.
@@ -23,42 +25,42 @@ We can verify few things to debug the issue of services being in DOWN state.
2325

2426
Look for any ERROR in node configuration. A typical router pod log would look like:
2527

26-
<img src="images/router-pod-log.png" width="200">
28+
<img src="images/router-pod-log.png" width="600" height="300">
2729

2830
3. Verify kube-cnc-router configmap output using:
2931

3032
```
3133
kubectl get configmaps -n <namespace> kube-cnc-router -o yaml
3234
```
33-
Look for Empty field in the data section of configmap. A typical 2 node data section would
35+
Look for Empty field in the data section of configmap. A typical 2 node data section would look like:
3436

35-
<img src="images/router-cmap-data.png" width="200">
37+
<img src="images/router-cmap-data.png" width="600" height="300">
3638

37-
4. Verify Node config
38-
- CNC interface "cncvxlan<md5_of_namespace>" got created
39-
- assigned VTEP IP same as the corresponding router gateway entry in ADC
40-
- status of interface is UP and RUNNING
41-
- iptable rule port got created.
39+
4. Verify Node config:
40+
- CNC interface "cncvxlan<md5_of_namespace>" should getcreated
41+
- assigned VTEP IP shoud be same as the corresponding router gateway entry in ADC
42+
- status of interface should be UP and RUNNING
43+
- iptable rule port should created.
4244
- port should be same as that of vxlan created on ADC
45+
46+
47+
<img src="images/slave-1.png" width="600" height="300">
4348

44-
Sample:
45-
<img src="images/slave-1.png" width="200">
46-
4749

4850
### Service status UP but ping from ADC not working
4951

5052
This is the case wherein though services are UP, still user can't do ping from ADC to the service IP.
51-
One probable reason for this could be the presence of a PBR entry which directs the packets from ADC with SRCIPas NSIP to a default gateway.
52-
As functionally wise, it will not cause any issue, user can ping with SRCIP as ADC VTEP created by CNC. User can use "-s" option to set the SRCIP to SNIP added by CNC on ADC.
53+
One probable reason for this could be the presence of a PBR entry which directs the packets from ADC with SRCIP as NSIP to a default gateway.
54+
As functionally wise, it will not cause any issue, user if required can ping with SRCIP as ADC VTEP created by CNC. User can use "-s" option to set the SRCIP to SNIP added by CNC on ADC.
5355

54-
Note: If its absolutely required to ping with NSIP itself, then as of now, User need to remove the PBR entry or add new PBR entry for endpoint with higher priority
56+
Note: If it is absolutely required to ping with NSIP itself, then as of now, User need to remove the PBR entry or add new PBR entry for endpoint with higher priority
5557

56-
### Curl to the pod endpoint not working
58+
### Curl to the pod endpoint/VIP not working
5759

58-
This is the case wherein though services are UP, still user can't curl to the pod endpoint.
59-
One Probable reason for this could be the ns mode "MBF" set to enable. This issue depends upon deployments andmight occur only on certain versions of ADC.
60+
This is the case wherein though services are UP, still user can't curl to the pod endpoint,that means, stateful TCP session to endpoint fails.
61+
One Probable reason for this could be the ns mode "MBF" set to Enable. This issue depends upon deployments and might occur only on certain versions of ADC.
6062

61-
To resolve this either:
63+
To resolve this, Either:
6264
- Disable MBF ns mode
6365
or
6466
- Bind a netprofile with netprofile Disabled to the servicegroup
@@ -67,7 +69,7 @@ Note: As of now, if disabling MBF resolves the issue, then it need to be kept di
6769

6870
## Customer Support
6971

70-
As general support, while raising issue please provide following for faster debugging.
72+
As general support, while raising issues please provide following for faster debugging.
7173

7274
Do a curl/ping from ADC to endpoint and do some captures.
7375

@@ -83,7 +85,7 @@ For node:
8385
```
8486
3. tcpdump capture on CNI interface lets say "vxlan.calico"
8587
```
86-
tcpdump -i vxlan.calic -w cni.pcap
88+
tcpdump -i vxlan.calico -w cni.pcap
8789
```
8890
4. output of "ifconfig -a" on the node.
8991
5. output of "iptables -L" on the node.
@@ -97,20 +99,11 @@ For ADC:
9799
5. show bridgetable
98100
6. show ns pbrs
99101
7. show ns bridgetable
100-
8. Try and capture nstrace while ping/curl:
102+
8. show ns mode
103+
9. Try and capture nstrace while ping/curl:
101104
```
102105
start nstrace -size 0 -mode rx new_rx txb tx -capsslkeys enABLED
103106
```
104107
```
105108
stop nstrace
106109
```
107-
108-
109-
110-
111-
112-
113-
114-
115-
116-

0 commit comments

Comments
 (0)